FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
sjoshi
Staff
Staff
Article Id 378190
Description

 

This article describes how to set up a FortiAnalyzer playbook that automatically bans a source IP address whenever traffic matches a block policy in FortiGate. By using automation stitches, the system can quickly identify and respond to threats in real-time, improving network security.

 

The guide provides a detailed, step-by-step process for configuring FortiAnalyzer playbooks, integrating them with FortiGate automation stitches, and verifying the IP banning procedure.

 

Scope

 

FortiGate, FortiAnalyzer.

 

Solution

 

  1. Make sure FortiGate is connected with FortiAnalyzer and the status is up

 

Capture.PNG

 

  1. Create an automation stitch in FortiGate with an Incoming webhook:

 

Capture.PNG

 

 

  1. Check if the webhook is showing in FortiAnalyzer under the FortiOS connector:

 

Capture.PNG

 

  1. Create an event Handler and filter with policy ID and assign a tag: Go to FortiSoc -> Handlers -> Data Selector List -> Create New

 

Capture.PNG

 

Go to -> FortiSoc -> Handlers -> Even Handler List -> Create New, select the data selector created in the above step and create a new rule.

 

Capture.PNG

 

  1. Create a playbook and choose the newly created Tag as an event triggerGo to -> FortiSoc -> Automation -> Playbook -> Create New -> New Playbook created from scratch and select event trigger

 

Capture.PNG

 

After the Event trigger is chosen, the next step is FOS_WEBHOOK.

 

Capture.PNG

 

Creating the Report:

 

12.PNG

 

 

 

The report will be available under the playbook once Enable Auto-cache and extended log filtering are enabled on report settings

 

  1. Result: Once the traffic matches the policy ID 2 on the FortiGate then the automation stitches get trigger on the FortiGate post which the source IP will be banned:

 

Capture.PNG

 

Capture.PNG

 

The Playbook monitor shows a successful:

 

Capture.PNG